BYOD and Your Business eBook

download BYOD and Your Business eBook

of 26

Transcript of BYOD and Your Business eBook

  • 7/29/2019 BYOD and Your Business eBook

    1/26

    Enabling Inside-Out Network Security

    Learn about the BYOD trend, the risks associated with this trend, and

    how to successfully adopt BYOD while securing your network.

  • 7/29/2019 BYOD and Your Business eBook

    2/26

    Enabling Inside-Out Network Security

    Agenda

  • 7/29/2019 BYOD and Your Business eBook

    3/26

    Enabling Inside-Out Network Security

    Gartner projects a 9-40% savings usingemployee PCs

    1 in 10 use personal computers for

    primary work device today

    50% use personal computers for work atsome time

    43% of companies have a written policy,with specific rules

    The Rise of BYOD

  • 7/29/2019 BYOD and Your Business eBook

    4/26

    Enabling Inside-Out Network Security

    BYOD: A fast-growing Dilemma

    The challenge: seamless and secure management of ALL devices

    By 2016 at least 50% of enterprise email users will rely primarily on a browser,

    tablet or mobile client instead of a desktop client. Gartner

    - AND -

    Today, 80% of attacks occur inside the network - SANS

  • 7/29/2019 BYOD and Your Business eBook

    5/26

    Enabling Inside-Out Network Security

    5

    The Security dilemma of BYOD

    1. People

    2. Processes3. Policy

    4. Technology

  • 7/29/2019 BYOD and Your Business eBook

    6/26

    Enabling Inside-Out Network Security

    Breach Statistics

    Verizon 2012 Data Breach Investigations Report

  • 7/29/2019 BYOD and Your Business eBook

    7/26

    Enabling Inside-Out Network Security

  • 7/29/2019 BYOD and Your Business eBook

    8/26

    Enabling Inside-Out Network Security

    BYOD: How is security breached?

    Data

    1. Accidentally download

    malware onto your device.2. Bring that device into work

    and bypass the firewall.

    3. A Trojan gets onto the

    network.

    4. Data gets transferred to a

    hacker without you even

    knowing it!

  • 7/29/2019 BYOD and Your Business eBook

    9/26

    Enabling Inside-Out Network Security

    All Networks and IP Devices have Holes that

    are known as:

    Common Vulnerabilities and

    Exposures (CVE)

    Whats the real internal security problem?

  • 7/29/2019 BYOD and Your Business eBook

    10/26

    Enabling Inside-Out Network Security

    BYOD Risk: New Malware Outbreaks

    Your favorite anti-virus program catches no more than 70-90% of malware!

    Whats running on everyones personal device? Who knows?

  • 7/29/2019 BYOD and Your Business eBook

    11/26

    Enabling Inside-Out Network Security

    BYOD Risk: New Malware Outbreaks

    Here's a video of my Droid cell phone that was hackedafter I loaded the new "Mobile Skype" program. It's as if the

    phone has been possessed. Had to get a new cell.

    http://www.youtube.com/watch?v=mpZgw5Db2ok

    Noticed this crazy messaging happening on my iPad2

    earlier this evening.

    You can see that there are messages being sent (blue

    background) and the keypad is not being used at the time.

    Secondly, I don't have a Romanian number or contact.Thirdly, I don't speak Romanian.

    Weird I tells ye! and it's still messaging back and forth as I

    type here.http://www.youtube.com/watch?v=wa9H-8Q1FeA

    http://www.youtube.com/watch?v=mpZgw5Db2okhttp://www.youtube.com/watch?v=wa9H-8Q1FeAhttp://www.youtube.com/watch?v=wa9H-8Q1FeAhttp://www.youtube.com/watch?v=wa9H-8Q1FeAhttp://www.youtube.com/watch?v=wa9H-8Q1FeAhttp://www.youtube.com/watch?v=mpZgw5Db2ok
  • 7/29/2019 BYOD and Your Business eBook

    12/26

    Enabling Inside-Out Network Security

    BYOD Risk: CVEs (iPhone sample)

    See: http://nvd.nist.gov

    The current value of credit cards on the black market Look, you can even buy in bulk!

    http://nvd.nist.gov/http://nvd.nist.gov/
  • 7/29/2019 BYOD and Your Business eBook

    13/26

    Enabling Inside-Out Network Security

    BYOD Risk: Lost or Stolen?

    More than

    a third of

    consumershave hadcell phones

    lost orstolen

  • 7/29/2019 BYOD and Your Business eBook

    14/26

    Enabling Inside-Out Network Security

    BYOD Risks: Control and Compliance

    The businesses in each of these vertical markets are

    all very different, but they are all faced with similar

    challenges:

    Ensuring Business Continuity.

    Controlling Network Access.

    Ensuring Regulatory Compliance.

    Behind every firewall, you need to manage BYOD.

  • 7/29/2019 BYOD and Your Business eBook

    15/26

    Enabling Inside-Out Network Security

    Awareness, training, culture

    Assessments, real-time monitoring,

    onboarding/departing employees, quarantining devices

    Acceptable use, email security, access control,

    password policy, patch mgmt., incident response,

    business continuity

    NAC, MDM, firewalls, A/V, IPS/WIPS, etc.

    BYOD Strategy

  • 7/29/2019 BYOD and Your Business eBook

    16/26

    Enabling Inside-Out Network Security

    Multi-faceted Internal Security

  • 7/29/2019 BYOD and Your Business eBook

    17/26

    Enabling Inside-Out Network Security

    Remember, while firewalls protectnetworks from the outside-in, over80% of successful attacks come

    from the inside.

    There is a major need for internalUTM to secure networks from the

    inside-out.

    Internal UTM: Critical technology

  • 7/29/2019 BYOD and Your Business eBook

    18/26

    Enabling Inside-Out Network Security

    Scalable from 25 devices to thousands

    by any and all

    types of devices if you dont want them

    on the network, they dont get on the

    network.

    network holes (CVEs) on the

    inside of your network and guide

    proactive remediation process

    through

    automated detection and blocking

  • 7/29/2019 BYOD and Your Business eBook

    19/26

    Enabling Inside-Out Network Security

  • 7/29/2019 BYOD and Your Business eBook

    20/26

    Enabling Inside-Out Network Security

  • 7/29/2019 BYOD and Your Business eBook

    21/26

    Enabling Inside-Out Network Security

  • 7/29/2019 BYOD and Your Business eBook

    22/26

    Enabling Inside-Out Network Security

    How NetClarity stops a breach

    Data

    1. Accidentally download malware onto your

    device.2. Bring that device into work and bypass the

    firewall.

    3. A Trojan gets onto the network.

    4. NetClarity quarantines the device that has

    a Trojan installs

    5. NetClarity stops the hacker from receivingthe data he was hoping to obtain!

  • 7/29/2019 BYOD and Your Business eBook

    23/26

    Enabling Inside-Out Network Security

    NetClarity Picks Up Where Firewalls,

    Anti-virus, Intrusion Detection Systems

    and Intrusion Prevention SystemsLeave Off

    John Gallant, President, Network World

    The Most Innovative

    NAC Vendor in the

    World Network Products Guide, Hot

    Companies, 2009, 2010, 2011

    The only Next Gen. NAC solution to be

    integrated with RSA enVision forenterprise-wide internal risk management

    Apurva More, RSA Secured Program Manager

    The BYOD NACwall Appliance Awards

  • 7/29/2019 BYOD and Your Business eBook

    24/26

    Enabling Inside-Out Network Security

    When evaluating NAC solutions, look for vendorsthat understand the consumerization trend and

    support, or have plans to support, policies for

    managing the non-Microsoft endpoints

    that will inevitably attempt to connect to yournetwork.

    Gartner NAC Report, 12/2010

    Next Generation NAC, Manages BYOD!

  • 7/29/2019 BYOD and Your Business eBook

    25/26

    Enabling Inside-Out Network Security

    1. Personal devices are pervasive but theBYOD trend isnt going anywhere.

    2. They add a new level of riskmanagement to the organization.

    3. There are technologies to mitigate therisk, like NetClaritys NACwalls!

    In Summary: Managing BYOD

    Q i ?

  • 7/29/2019 BYOD and Your Business eBook

    26/26

    Enabling Inside-Out Network Security

    Questions?

    http://www.netclarity.net/